Sciweavers

14071 search results - page 2736 / 2815
» Fundamentals of simulation modeling
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
ISQED
2007
IEEE
127views Hardware» more  ISQED 2007»
14 years 3 months ago
Sensitivity Based Link Insertion for Variation Tolerant Clock Network Synthesis
Clock distribution is one of the key limiting factors in any high speed, sub-100nm VLSI design. Unwanted clock skews, caused by variation effects like manufacturing variations, po...
Joon-Sung Yang, Anand Rajaram, Ninghy Shi, Jian Ch...
ISQED
2007
IEEE
141views Hardware» more  ISQED 2007»
14 years 3 months ago
OPC-Friendly Bus Driven Floorplanning
In this paper, we address the interconnect-driven floorplanning problem that integrates OPC-friendly bus assignment with floorplanning. Buses consist of a number of horizontal/v...
Hua Xiang, Liang Deng, Li-Da Huang, Martin D. F. W...
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra
MSS
2007
IEEE
153views Hardware» more  MSS 2007»
14 years 3 months ago
Hybrid Host/Network Topologies for Massive Storage Clusters
The high demand for large scale storage capacity calls for the availability of massive storage solutions with high performance interconnects. Although cluster file systems are rap...
Asha Andrade, Ungzu Mun, Dong Hwan Chung, Alexande...
« Prev « First page 2736 / 2815 Last » Next »